40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials
Briefly

40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials
""The compromised versions include a function (NpmModule.updatePackage) that downloads a package tarball, modifies package.json, injects a local script (bundle.js), repacks the archive, and republishes it, enabling automatic trojanization of downstream packages," supply chain security company Socket said. The end goal of the campaign is to search developer machines for secrets using TruffleHog's credential scanner and transmit them to an external server under the attacker's control. The attack is capable of targeting both Windows and Linux systems."
""The following packages have been identified as impacted by the incident - angulartics2@14.1.2 @ctrl/deluge@7.2.2 @ctrl/golang-template@1.4.3 @ctrl/magnet-link@4.0.4 @ctrl/ngx-codemirror@7.0.2 @ctrl/ngx-csv@6.0.2 @ctrl/ngx-emoji-mart@9.2.2 @ctrl/ngx-rightclick@4.0.2 @ctrl/qbittorrent@9.7.2 @ctrl/react-adsense@2.0.2 @ctrl/shared-torrent@6.3.2 @ctrl/tinycolor@4.1.1, @4.1.2 @ctrl/torrent-file@4.1.2 @ctrl/transmission@7.3.1 @ctrl/ts-base32@4.0.2 encounter-playground@0.0.5""
""json-rules-engine-simplified@0.2.4, 0.2.1 koa2-swagger-ui@5.11.2, 5.11.1 @nativescript-community/gesturehandler@2.0.35 @nativescript-community/sentry 4.6.43 @nativescript-community/text@1.6.13 @nativescript-community/ui-collectionview@6.0.6 @nativescript-community/ui-drawer@0.1.30 @nativescript-community/ui-image@4.5.6 @nativescript-community/ui-material-bottomsheet@7.2.72 @nativescript-community/ui-material-core@7.2.76 @nativescript-community/ui-material-core-tabs@7.2.76 ngx-color@10.0.2 ngx-toastr@19.0.2 ngx-trend@8.0.1 react-complaint-image@0.0.35 react-jsonschema-form-conditionals@0.3.21 react-jsonschema-form-extras@1.0.4 rxnt-authentication@0.0.6 rxnt-healthchecks-nestjs@1.0.5 rxnt-kue@1.0.7 swc-plugin-component-annotate@1.9.2""
More than 40 npm packages across multiple maintainers were trojanized via a supply chain attack. Compromised package versions include a function (NpmModule.updatePackage) that downloads a package tarball, modifies package.json, injects bundle.js, repacks the archive, and republishes the package. The injected payload uses TruffleHog to scan developer machines for credentials and transmits discovered secrets to an attacker-controlled external server. The campaign targets both Windows and Linux environments. A long list of packages and scoped namespaces were impacted, requiring maintainers and users to identify and replace compromised versions.
Read at The Hacker News
Unable to calculate read time
[
|
]